Prime Discount
expires in
Register Now

Agenda

Digital ID Deep Dives

Digital ID Deep Dives

Session Stream V

In the intricate and expansive ecosystem of Digital ID and Cloud Security, having a surface-level understanding merely scratches the tip of the iceberg. The "Digital ID Deep Dives" session at EIC 2024 is dedicated to those seeking a profound, nuanced grasp of the critical topics and innovative trends that form the backbone of our digital future. This stream pulls back the layers, offering in-depth examinations, intricate discussions, and comprehensive insights into the very core of digital identity and its intertwined relationship with cloud security.

Deconstructing Identity Fabrics:

  • The Genesis: Explore the foundational principles, standards, and technologies driving the evolution of digital identity fabrics.
  • Interoperability & Integration: Delve into the challenges and strategies associated with ensuring seamless identity management across diverse platforms and ecosystems.

eIDAS 2 Deployment Challenges:

  • Navigating the Landscape: Understand the complexities and nuances of deploying eIDAS 2, Europe's regulatory framework for electronic identification and trust services.
  • Interoperability Hurdles: Delve into the challenges faced in ensuring cross-border and cross-sector compatibility.
  • Balancing Security and Usability: Tackle the perennial task of maintaining robust security without compromising user convenience and accessibility.

Extended Explorations from Other Streams:

  • Retrieval-Augmented Generation & Generative AI: An enriched understanding of their profound impact on secure application design and deployment in cloud environments.
  • Spatial Computing & Phygital Convergence: A detailed examination of their implications for digital ID management, user authentication, and data protection in blended realities.
  • Sustainable Security: Dive deeper into the nexus between green technology initiatives and their integration into cloud security frameworks.

Hands-On Workshops:

  • Practical Insights: Engage in interactive sessions, simulations, and workshops, translating theoretical knowledge into actionable strategies.
  • Expert-led Sessions: Benefit from the expertise of leading figures in the industry, offering insights, guidance, and answers to the most pressing questions.

Collaborative Conversations:

  • Roundtable Discussions: Join peers and experts in intensive dialogues, debating challenges, sharing experiences, and co-creating solutions.
  • Case Studies: Dive into real-world scenarios, understanding challenges, dissecting strategies, and extracting invaluable lessons.

The "Digital ID Deep Dives" session stream at EIC 2024 is a hands-on journey, a chance for attendees to immerse themselves fully, expanding their expertise and elevating their understanding of the intricate realms of digital identity and cloud security.


Digital ID & AI Deep Dives

AI Joins the Team I

June 05, 2024 11:00 - 11:20
Control AI with Prompt Engineering
Have you ever wanted to control a powerful AI? Now you can, with prompt engineering! Prompt engineering is the art of using specific instructions, or prompts, to tell large language models (LLMs) what you want them to do. By carefully crafting prompts, you can direct LLMs to produce specific results, such as writing a poem, translating a document, or answering a complex question. In this talk, I will give you a behind-the-scenes look at how prompt engineering works. I will show you how to...

June 05, 2024 11:20 - 11:40
Data Strategy for Generative AI Applications — Why Your Data is the Differentiator
Generative AI is transforming industries. To realize its full potential, you need a modern data strategy. Join this session to learn how to develop an effective data strategy and build generative AI applications that deliver domain-specific experiences. We'll discuss data-centric architectural patterns that can help you accelerate your AI development, improve customer experience, and gain better business insights. We will also discover how to align your data and generative AI strategy with...

Amazon Web Services (AWS)
Amazon Web Services (AWS)
June 05, 2024 11:40 - 12:00
Creating Human-Readable Activity Summary from Millions of Logs Using LLMs
Log data of all kinds store a wealth of information about benign and malicious identity and system behavior that are difficult for humans to understand. With examples drawn from AWS CloudTrail data, we will show practitioners how to leverage Large Language Models to mine log data and provide easily understandable, human-readable summaries of normal user session behavior as well as explain malicious activities.

Andromeda Security
Andromeda Security

AI Joins the Team II

June 05, 2024 12:00 - 12:20
Too Many Hats, Too Little Time: Embracing AI for Professional Mastery
In this engaging and informative presentation, based on the principles outlined in "Too Many Hats, Too Little Time," attendees will explore innovative strategies for integrating generative AI into their professional lives. The talk is designed to demystify the process of leveraging AI personas—virtual executives like CEOs, CFOs, General Counsels, and CMOs—to enhance decision-making and task management. It offers a comprehensive roadmap for professionals at all levels, from those...

Vivander Advisors
June 05, 2024 12:20 - 12:40
Igniting Innovation: Strategies for Fostering a High-Performance AI Startup within Your Enterprise
Discover the key strategies for nurturing a high-performance AI startup within the corporate structure of your enterprise. "Igniting Innovation" offers a roadmap to cultivating an environment that encourages agility, fosters creative thinking, and harnesses the potential of AI technologies. Learn how to blend the entrepreneurial spirit of a startup with the robust resources of an established enterprise, unlocking new avenues for growth, innovation, and competitive edge in the ever-evolving...

Vstorm.co
June 05, 2024 12:40 - 13:00
AI Agents and Identity Wallets: Preserving Privacy in Data Sharing
AI agents will play a pivotal role in boosting productivity and quality of life for many people. However, AI agents are often hampered by the lack of necessary context to complete critical tasks. Sharing unrestricted access to personal data with an AI agent leads to serious privacy concerns. This presentation seeks to address these challenges by introducing a novel approach utilizing verifiable credentials and identity wallets to give an AI agent selective access to personal data in a...

Trinsic

Digital ID Deep Dives

B2B, CIAM, OAuth 2

June 05, 2024 14:30 - 14:50
Business to Business (B2B) Delegated Client Authorisation Using OAuth 2.0
With the growing exposure of digital services and assets through application programming interfaces (APIs) and the emergence of the API Economy, entire business models are starting to be built around APIs. Increasingly, APIs are designed to be used externally as part of an organisation’s service delivery model. The adoption of the OAuth protocol has allowed consumer-to-business (C2B) integrations to authorise access to APIs in a standardised way. However, business-to-business (B2B)...

National Australia Bank
June 05, 2024 14:50 - 15:10
B2B Identity: How the Companies of the HTI Group Took Digitalization to the Next Level
The companies of the HTI Group combine innovative solutions and sustainable products in the fields of winter sports technology, urban mobility, material transport, snow and vegetation management, as well as renewable energies. As developers and manufacturers, the companies of HTI are drivers of innovation and are active worldwide. Their products and solutions need to perform reliably and safely in remote areas, often under extreme environments. Operational excellence is core to the value that...

HTI Services
June 05, 2024 15:10 - 15:30
Fostering Trust in Global Automotive Supply Chains Through DID and SSI
In a world that's becoming increasingly interconnected, establishing trust within global networks is both a critical challenge and a foundational necessity for successful collaboration and secure data exchange. The emergence of Self-Sovereign Identity (SSI) and Decentralized Identifiers (DID) has introduced new paradigms for digital identity that empower individuals and organizations with greater control and privacy while also ensuring interoperability and trust at scale. This talk delves...

Accenture

Wallet Security

June 05, 2024 15:30 - 15:50
Wallet Security Mechanisms for the Decentralized Ecosystem
The concept of building trust relationships is an integral part of a decentralized ecosystem. A verifier must trust the identities of issuers to ensure the authenticity and integrity of data and a wallet must trust the identities of verifiers to ensure data is only sent to identified and authorized parties. The other important trust relationship is in the identity of the wallet and assures both issuer and verifier that they are communicating with a genuine, verified and unaltered wallet....

Bundesdruckerei GmbH
June 05, 2024 15:50 - 16:10
The eIDAS 2.0 Era: Exploring the Security Landscape of Digital Identity Wallets
In the digital era, the security and privacy of personal and sensitive information has become a critical concern. Digital identity wallets have been introduced as a result of the new European regulation known as eIDAS 2.0. The digital identity wallet offers a practical and secure method for individuals to manage their personal data across various online platforms through a decentralized digital identity management model, without the reliance on centralized identity providers. However, since...

Fondazione Bruno Kessler (FBK)
Fondazione Bruno Kessler (FBK)
June 05, 2024 16:10 - 16:30
The business Entity as an Authentic Source for Attributes
eIDAS version 2 introduces a new trust service that will significantly impact the identity landscape: the provisioning of attestations of attributes. Having attributes issued by a qualified trust provider will greatly enhance the reliability and availability of attributes required for business decisions. Businesses generate data about themselves and other natural and legal persons, and they are the authentic source of the attributes they generate. Hypervault (https://hypervault.com/) and...

Trust Agency

Authorization

June 05, 2024 17:30 - 17:50
How AI Can Help IAM Deliver Better and Stronger Authorization
Whether you are excited about the possibilities of AI in your workplace or concerned about the overall privacy risks implementing the technology with a mind of its own - you can’t deny that AI is here to stay. It is bound to impact several facets of the world of access control and authorization. Take policies for instance: as humans, we seldom excel at implementing every single requirement into policy. Just typing in that employees are not able to access certain data in a time frame but...

Axiomatics AB
June 05, 2024 17:50 - 18:10
Un-Complicate Authorization Maintenance
Every application at some point needs to tackle user permissions. It may be early for some systems or much later in others, but one thing for certain is that as soon as you have more than one user type, the logic will slowly evolve into spaghetti code. And then each time you need to update it will take longer and longer to complete.In this talk, we’ll proselytize about why decoupling authorization logic is the absolute best solution to the spaghetti code problem and other common...

Cerbos
June 05, 2024 18:10 - 18:30
OpenID AuthZEN: Standards for Modern Authorization
Sign-on standards, such as SAML and OpenID Connect (OIDC), have paved the way for an interoperable identity fabric that has propelled the industry forward. It’s time for authorization to have its “OIDC moment.” Over the past few years, we’ve seen the rise of a new architectural pattern - externalizing authorization logic out of applications, and treating it as a separate concern. Google, Netflix, Airbnb, Carta, Intuit, and others have shared their experiences around...

Venn Factory
Strata Identity, Inc
Axiomatics AB
Aserto

Digital ID Deep Dives

Authentication Trends

June 06, 2024 11:00 - 11:15
Finding the Right Passwordless Authentication Solution
Passwordless Authentication has become a popular and catchy term. The term Passwordless Authentication is used to describe a set of identity verification solutions that do not rely on passwords. In light of the security risks and inconvenience associated with password usage, we face a trend in which organizations are looking to replace and eliminate passwords entirely. Yet, finding a Passwordless Authentication solution that seamlessly combines simplicity, effectiveness, and security remains...

KuppingerCole
June 06, 2024 11:15 - 11:30
Embracing the Password[less] Future
When it comes to your employees authenticating, multiple methods make for a complex tech stack. What if there were a simpler solution? One that could consolidate your tools while removing a login method that is largely reliant on human behaviour: Why businesses are looking to Passwordless authentication to secure their data. How & when they plan on implementing Passwordless technology (moving legacy into the future SSO, FIDO and Passkeys) The important role of passkeys in this...

LastPass

Balancing Authentication & Privacy

June 06, 2024 12:00 - 12:20
The Role of Biometrics in Digital Identity
How biometrics are used in establishing foundational identity, how they are used when creating functional identities, and what are some of the vulnerabilities and mitigation strategies when using biometrics in digital identity schemes.

June 06, 2024 12:20 - 12:40
Leveraging Smartphone Secure elements – The Benefits of QSCD Certification
Secure elements, now increasingly available on smartphones, offer enhanced security and integrity protection for PKI processes. They are especially needed for CBDC interactions, as recognised by the Bank of International Settlements Polaris project report on offline payments as well as the ECB in its concluding report on the investigation phase of the digital euro. However the lack of dedicated specifications is preventing them reaching their full potential. Having secure elements certified...

Quali-Sign
SGM Consulting
June 06, 2024 12:40 - 13:00
Scaling eIDAS 2.0 Wallets: The Secure Element Problem
The current approach for wallet and decentralized identities is not eIDAS 2.0 high compliant. In this talk we explore, what the current approaches are, what goes wrong and what we can do about it. After this session you will be a eIDAS 2.0 wallet expert.

Digital ID Deep Dives

Zero Trust Identity

June 06, 2024 14:30 - 14:45
Zero Trust Network Access - Microsoft New Security Service Edge Solution
During this Session you will learn how Microsoft is closing gaps in the Zero Trust area and how SSE can help you to reduce operations and process capacities and heavily improve Security. Additional we look into a future without a VPN solution and see how this can be modernise.

Microsoft
June 06, 2024 14:45 - 15:00
Automating Security Checks on AWS - a Deep Dive Into Preventing Privilege Escalations
When moving to the Cloud, and especially AWS, common Identity Management functionality as found in on-premise tools have limited impact on securing your AWS environment, as many new types of access to a plethora of AWS resources for an overwhelming number of users need to be managed. Luckily, AWS provides a very detailed and granular model of roles and predefined policies to define who (or which entity) may be granted to access to which object. All done - right? Unfortunately, either through...

umbrella.associates GmbH
CodeShield
June 06, 2024 15:00 - 15:15
Overcoming Passwords and Legacy: The Future of Customer Identity
The face of customer identity has changed completely over the years. While legacy systems such as password-based authentication and SAML continue to be present in the market, more modern specifications such as OpenID Connect and FIDO2 are quickly gaining ground and powering unique use cases that enterprises require today. In this session, Descope Co-Founder Meir Wahnon will: Highlight the changing customer identity needs facing today’s enterprises Share popular use cases of modern...

Descope

Zero Knowledge

June 06, 2024 15:30 - 15:45
Zero-Knowledge Proof
ZKP is a cryptographic method that allows one party (the prover) to prove to another party (the verifier) that a statement is true, without revealing any specific information about the statement itself. For example: verify you are of legal age to purchase a beer, without the vendor being able to see your date of birth. prove you live in a specific country or area, without disclosing your private home address. confirm you have the necessary income for a mortgage application, without...

June 06, 2024 15:45 - 16:00
The Use of Zero Knowledge in Self Sovereign Identities
In the same way Blockchain seems the best solution for a decentralized immutable to support decentralized identities, Zero Knowledge has become as the best technology to build privacy-by-default identity stacks. We will show how ZK can be use for enabling highly scalable and private identities, solving for multiple use cases and problems like: Proof of Credentials Private credential revocations DID methods that support Key Rotation Nullifiers for DID anti-tracking Proof of execution...

Polygon Labs
June 06, 2024 16:00 - 16:15
eIDAS2 Toolbox: Selective Disclosure and ZKP in the Identity Wallet
In this session, Sebastian Elfors gives an introduction into what selective disclosure really means for the EUDI Wallet within eIDAS2. He will delve into the topic of what selectively disclosed attributes are, unlinkability between relying parties, range proofs and zero-knowledge proof (ZKP) predicates. He will then dissect the legal definitions of “selective disclosure” within the eIDAS2 proposal as well as the technical definitions in the ARF outline. Next, different selective...


Investor Talks

June 06, 2024 17:30 - 17:50
Embracing a Best-in-Class Digital ID Solution – the Investor Perspective
Investor appetite for high-impact identity security solutions remains strong, with superior product technology serving as the foundation for growth. As the shift from growth to value investing continues, companies are aligning go-to-market and product strategies for strong unit economics and steady profitable growth. With technological advancements and user demands constantly shifting, staying ahead in the identity security market hinges on an M&A strategy focused on the most...

June 06, 2024 17:50 - 18:10
How VC Views Identity
Over the past 10 years identity startups have launched to the forefront across segments like wallets, ID Verification, fraud, cybersecurity. But how do investors evaluate identity focused startups? What are they looking for? This presentation will cover these topics from the perspective of an identity investor. 

Okta Ventures
Speedinvest
June 06, 2024 18:10 - 18:30
Public Funding for Tech
Join our conference session for an insightful exploration of the vital role of public funding in driving advancements in AI, Digital ID, and Cybersecurity in Europe. Discover the landscape of grants and loans as indispensable tools propelling transformative progress in these cutting-edge fields! Within the European Union's expansive €13.5 billion EUR budget for research and innovation projects, our discussion aims to illuminate the significance of public financing in shaping the...

Grants Office Europe
Grants Office Europe

Digital ID Deep Dives

Policy Engines

June 07, 2024 10:30 - 10:50
The Policy Engines Showdown
Policy engines and standards are just everywhere, and the decision you need to make for a good decision engine is getting harder. Since 2015, policy engines have been the bread and butter of my career. My story started with spending 6 months building a policy engine by myself, just to replace it with an open-source version. Since then, I’ve been involved in the development of many engines, and I have a path to help you find the right one for you. In this talk, I’ll start with an...

Permit.io
June 07, 2024 10:50 - 11:30
Panel: Policy Engines in Practice
In this panel, we will host professionals from multiple industries who extensively use policy engines in their day-to-day jobs. We will hear from the end user's perspective what made them choose a particular policy engine over others and what important lessons they learned. We will try to focus on use cases over the basic engine functionality and provide an in-depth comparison that will help you identify the one that works best for you.

Strata Identity, Inc
Axiomatics AB
Permit.io

Wallets & Authentication

June 07, 2024 11:30 - 11:50
Digital Wallet Holder Binding
Digital wallets are applications used to receive, store, and share identity attributes in a standards-based [preferably], secure, privacy enhancing fashion. To prove that the legitimate, natural person is receiving, in possession of, or sharing these identity attributes a means to bind them to the natural person is needed. In 1995, for example, the International Civil Aviation Organization (ICAO) clearly recognized the desirability of pursuing the use of biometrics in travel documents as the...

June 07, 2024 11:50 - 12:10
Bridging OIDC & SIOPv2 to Kick-Start Adoption
OpenID Connect (OIDC) has become the go-to method for user authentication due to its seamless integration. Transitioning towards the more privacy-preserving Self-Issued OpenID Connect Provider (SIOPv2) will be a complex endeavor.To simplify this shift, Impierce Technologies has created an open-source OIDC - SIOPv2 Bridge. This bridge can run alongside an Identity Provider, allowing seamless interaction with SIOPv2 Identity Wallets. The Relying Party (RP) continues to enjoy the ease of...

Impierce Technologies

Secure your ticket
Be quick before the Prime Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch